I Hate CBT's

View Original

What Should You Consider Security Baselines

Question: Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)

Answer:

Question: Which of the following describes a configuration baseline?

Answer:

Question: What should you consider security baselines?

Answer:

Question: By definition, what is the process of reducing security exposure and tightening security controls?

Answer:

Question: Which of the following is the strongest form of multi-factor authentication?

Answer:

Question: You have recently experienced a security incident with one of your servers. After some research, you determine that a new hotfix has recently been released, which would have protected the server.

Which of the following recommendations should you follow when applying the hotfix?

Answer:

Question: Which of the following actions should you take to reduce the attack surface of a server?

Answer:

Question: Which of the following do security templates allow you to do? (Select two.)

Answer:

Question: You have just purchased a new network device and are getting ready to connect it to your network. Which of the following actions should you take to increase its security? (Select two.)

Answer:

Question: Which of the following is defined as an operating system that comes hardened and validated to a specific security level as defined in the Common Criteria for Information Technology Security Evaluation (CC)?

Answer: TOS

A trusted operating system (TOS) is one that has been hardened and validated to a specific level as defined by the Common Criteria.

Windows, UNIX, and OS X are not TOSs by default.